Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 74 Topic 8 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 74 Topic 8 Discussion

312-49v11 Exam Topic 8 Question 74 Discussion:
Question #: 74
Topic #: 8

During an investigation into a suspected data breach at a multinational corporation, forensic investigators have seized multiple devices, including Windows PCs, Linux servers, and Android smartphones, for analysis. Additionally, a few Mac computers have been identified as potential sources of evidence.

To gather comprehensive insights into the activities leading up to the breach, Which of the following methods would be most effective for viewing log messages on Mac devices?


A.

Using the Terminal application to navigate to the /var/log directory and examining log files such as system.log and secure.log.


B.

Accessing the Event Viewer utility in the Control Panel to retrieve system logs and security event records.


C.

Installing third-party forensic software specifically designed for Mac systems, offering advanced log analysis capabilities and visualization tools.


D.

Employing the Windows Subsystem for Linux (WSL) to run Linux-based log analysis tools, enabling seamless integration with Mac systems.


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.